OTHER BUSINESS SECURITY SERVICES
SECURITY DEVICE POLICY REVIEW
Ensuring that firewall rules and configuration meet security best practices is a fundamental activity for the information protection. This activity may require a continuous and significant effort in the policy management
This service relies on the management and optimization of the patching processes in order to reduce losses on the corporate assets. It includes a risk assessment which correlates the information to its vulnerabilities incident and to the likelihoods showing priority for critical assets reporting the potential business impact
SECURITY POSTURE REVIEW
Assessment of the current status of your organization at multiple level (network, systems and applicative). The service includes a preliminary phase of gap analysis with respect to reference standards and to the main industry best practices, followed by a risk assessment and by technical activities of monitoring and vulnerabilities discovering
BUSINESS IMPACT ANALYSIS
Identifying the prior resources and services to ensure continuous delivery and quick recovery following a disruption is an important task. Each service that is critical to ongoing business operations is assessed and planned in detail identifying possible threats and dangers as well as impact and like- hood parameters in order to perform a risk analysis of suitable entity with respect to the considered enterprise size).